Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe
Resource
win7-20240215-en
General
-
Target
ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe
-
Size
393KB
-
MD5
b8464e043c9ba29f5b70fdaadf00922b
-
SHA1
828d5c2072b34fd1b9a5988a303f354474d6fc1c
-
SHA256
ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd
-
SHA512
1b0ae871b17fee5381a047eefbdac50437a57fda1de6ada6e76c8fe13ce316f2a77a61c5d3e40e99af8616afa5534f31ebd5b2341e1e30fdcfda944fc5dd279f
-
SSDEEP
6144:D+a0P2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moHXG:D+aZahVy41
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2096 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2504 Logo1_.exe 1108 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe -
Loads dropped DLL 1 IoCs
pid Process 2096 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1049\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Mail\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe Logo1_.exe File created C:\Program Files\Microsoft Games\Multiplayer\Checkers\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sv\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Defender\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\Office14\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ICE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\Office14\1033\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\es\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ga\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre7\bin\dtplugin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ARFR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\CPU.Gadget\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\WMPDMC.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Media Player\wmplayer.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EDGE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\ESEN\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Logo1_.exe ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\rundl132.exe ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
pid Process 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe 2504 Logo1_.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2964 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 28 PID 2204 wrote to memory of 2964 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 28 PID 2204 wrote to memory of 2964 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 28 PID 2204 wrote to memory of 2964 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 28 PID 2964 wrote to memory of 3032 2964 net.exe 30 PID 2964 wrote to memory of 3032 2964 net.exe 30 PID 2964 wrote to memory of 3032 2964 net.exe 30 PID 2964 wrote to memory of 3032 2964 net.exe 30 PID 2204 wrote to memory of 2096 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 31 PID 2204 wrote to memory of 2096 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 31 PID 2204 wrote to memory of 2096 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 31 PID 2204 wrote to memory of 2096 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 31 PID 2204 wrote to memory of 2504 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 32 PID 2204 wrote to memory of 2504 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 32 PID 2204 wrote to memory of 2504 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 32 PID 2204 wrote to memory of 2504 2204 ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe 32 PID 2504 wrote to memory of 2676 2504 Logo1_.exe 34 PID 2504 wrote to memory of 2676 2504 Logo1_.exe 34 PID 2504 wrote to memory of 2676 2504 Logo1_.exe 34 PID 2504 wrote to memory of 2676 2504 Logo1_.exe 34 PID 2676 wrote to memory of 2716 2676 net.exe 36 PID 2676 wrote to memory of 2716 2676 net.exe 36 PID 2676 wrote to memory of 2716 2676 net.exe 36 PID 2676 wrote to memory of 2716 2676 net.exe 36 PID 2096 wrote to memory of 1108 2096 cmd.exe 37 PID 2096 wrote to memory of 1108 2096 cmd.exe 37 PID 2096 wrote to memory of 1108 2096 cmd.exe 37 PID 2096 wrote to memory of 1108 2096 cmd.exe 37 PID 2504 wrote to memory of 2436 2504 Logo1_.exe 38 PID 2504 wrote to memory of 2436 2504 Logo1_.exe 38 PID 2504 wrote to memory of 2436 2504 Logo1_.exe 38 PID 2504 wrote to memory of 2436 2504 Logo1_.exe 38 PID 2436 wrote to memory of 2564 2436 net.exe 40 PID 2436 wrote to memory of 2564 2436 net.exe 40 PID 2436 wrote to memory of 2564 2436 net.exe 40 PID 2436 wrote to memory of 2564 2436 net.exe 40 PID 2504 wrote to memory of 1184 2504 Logo1_.exe 21 PID 2504 wrote to memory of 1184 2504 Logo1_.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe"C:\Users\Admin\AppData\Local\Temp\ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a1BDA.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe"C:\Users\Admin\AppData\Local\Temp\ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe"4⤵
- Executes dropped EXE
PID:1108
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2716
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2564
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5f1ff0cfb99f6b0bf2a9e1de01f1ec6c2
SHA1487ec0860993efcb76858a15e85372df2987750d
SHA256bb358cb0d1d27f1977fc528b2706cc7dacebb059c6f13a894cf390aeeb2f72e0
SHA5124eb05b18d762707e7c7632dd7c9b1858d9498c36998d23fd2b71ee37a5f09d8641db6397aae98d9c55aa4a5ed03189fdfbae2b50095ae5ccd88f75c361d739b4
-
Filesize
477KB
MD5c6c3f9890c41439a4dfc9fd4bec7b0bd
SHA1f5c4a05f34d1a08abf73514f5b3ddcedc704f2f0
SHA256462f333d5748c1a756e2565a2d76f89c9fdafb8d2fa62a83c60e4f70d0da2f92
SHA51269212e26a76e5e67e2b1337bfd97ad766293d6c0093ce0d8ef5fa768cd002094d9de936620a479bb474e27ff359b08d751ccfe37b9a15824f39b548596a9098a
-
Filesize
722B
MD50da5594eb9b11145a0dcd6cbc450c392
SHA1a24c0d5f92cfeebb4a983765c238e227139cf50d
SHA25664e274eb19a98c7c5e5f1efc4353a01aaf35a5d2551462f925bf40a99e14db99
SHA5124a1d3bc70d2bfe01af16660356466d912679a70eac1747bf39f7eb463d7c26f3151f656b27c2235277760d1697454377f7c247c325a012ce865a1836ca724609
-
C:\Users\Admin\AppData\Local\Temp\ef3c3bc144e2b0a45b439fedd02afdef60163054a340492019cad2b5dccd4edd.exe.exe
Filesize360KB
MD55fbd45261a2de3bb42f489e825a9a935
SHA1ff388f6e9efe651ec62c4152c1739783e7899293
SHA2569e63701598199d5c47217e23b44d0e3ec5d53f5419166b1b6c68a7e9e8fc47a4
SHA5127f22b1995a07016adb342c551454d602bfbe511525139aee8581b62116608e9e278fd81c26382f1333c7eccded4474196e73c093bb5cbf8e8f203e865024c058
-
Filesize
33KB
MD502c56be1db3c03dbaf50330e686d3c74
SHA1c38374d6d8db6163f21b27fb353778f94e3cd1e9
SHA25698ce89e1c74b56f7336b4cfab30d0280e56f9dbef29a8c38ac7540e22df4b5b5
SHA512c4ee4590c268296541f3031b16570d9fdd3d6bd85fa3cc2c2a4f5594bfd4888eee7749d2eb3a44cafe38a9cfa777ee82b58d9d0bf5c7682c2f8d02bdbba54ef4
-
Filesize
9B
MD5a4e284afce5c2e93b509543e6064da82
SHA177a7ae3e38b05410dcf335f8abe1df4d7f0b141c
SHA256f4460d1a85b2980fa2b8d329adda0fd330f8157d7afc2d7b1bad62453ff1dfe8
SHA5128f2147ca54c96b0b05bf69a7919b5bf54b20036ba8336f6ba379c2abb0d31139a91d315130040ef1d06450dd624d8a8661396eb082407b8f7455be4d61351821